*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffaea8010
Arg3: 0000000000020000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2046
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2044
Key : Analysis.Init.CPU.mSec
Value: 2687
Key : Analysis.Init.Elapsed.mSec
Value: 77463
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : MemoryManagement.PFN
Value: 20
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 033022-27750-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff81bffaea8010
BUGCHECK_P3: 20000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffdb05`94cc7db8 fffff806`368440ca : 00000000`0000001a 00000000`00041792 ffff81bf`faea8010 00000000`00020000 : nt!KeBugCheckEx
ffffdb05`94cc7dc0 fffff806`3689e5d6 : 00000000`00000000 00000000`00000000 00000000`000007ad ffff81bf`faea8010 : nt!MiDeleteVa+0x153a
ffffdb05`94cc7ec0 fffff806`3689e6eb : ffff81c0`dffd7540 ffffcb06`e340e700 ffffdb05`00000000 ffffdb05`94cc8330 : nt!MiWalkPageTablesRecursively+0x776
ffffdb05`94cc7f60 fffff806`3689e6eb : ffff81c0`00000000 ffffcb06`e340e700 ffffdb05`00000001 ffffdb05`94cc8340 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb05`94cc8000 fffff806`3689e6eb : ffff81c0`00000000 ffffcb06`e340e700 ffffdb05`00000002 ffffdb05`94cc8350 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb05`94cc80a0 fffff806`36804f4b : 00000000`00000000 ffffcb06`e340e700 00000000`00000003 ffffdb05`94cc8360 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb05`94cc8140 fffff806`36842961 : ffffdb05`94cc82e0 ffffcb06`00000000 ffff81be`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffdb05`94cc8240 fffff806`36812aa0 : 00000000`00000001 ffffdb05`00000000 ffffcb06`e340e550 ffffcb06`d7bc1080 : nt!MiDeletePagablePteRange+0x4f1
ffffdb05`94cc8550 fffff806`36c01dd9 : ffffcb06`daba68a0 00000000`00000000 ffffcb06`00000000 ffffcb06`00000000 : nt!MiDeleteVad+0x360
ffffdb05`94cc8660 fffff806`36c01470 : ffffcb06`daba68a0 ffffcb06`d58e4300 ffffcb06`d7bc1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffdb05`94cc8690 fffff806`36bff73f : ffffcb06`daba6b20 ffffcb06`daba6b20 ffffcb06`daba68a0 ffffcb06`e340e080 : nt!MiCleanVad+0x30
ffffdb05`94cc86c0 fffff806`36c5dbf8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffcb06`e340e080 : nt!MmCleanProcessAddressSpace+0x137
ffffdb05`94cc8740 fffff806`36cb26b6 : ffffcb06`e340e080 ffffe006`9a960060 ffffdb05`94cc8990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffdb05`94cc87d0 fffff806`36cf73f8 : ffffcb06`00000000 00000000`00000001 ffffdb05`94cc89e0 000000da`a2391000 : nt!PspExitThread+0x5f6
ffffdb05`94cc88d0 fffff806`3680ef67 : 00000000`40dd0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffdb05`94cc8910 fffff806`369fbbc0 : 000000da`a4bff848 ffffdb05`94cc89c0 ffffdb05`94cc8b80 00000863`00000000 : nt!KiDeliverApc+0x487
ffffdb05`94cc89c0 fffff806`36a0905f : 00007ff8`7ad05b90 ffffdb05`94cc8b80 ffffdb05`94cc8b18 ffffffff`ff676980 : nt!KiInitiateUserApc+0x70
ffffdb05`94cc8b00 00007ff8`7cc8cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000da`a4bff818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7cc8cdf4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------